00:00

QUESTION 21

The Malicious code that is installed on the computer without user’s knowledge to acquire information from the user’s machine and send it to the attacker who can access it remotely is called:

Correct Answer: A

QUESTION 22

The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:

Correct Answer: B

QUESTION 23

The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and G.
212-89 dumps exhibit

Correct Answer: C

QUESTION 24

Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of an IRT?

Correct Answer: B

QUESTION 25

Which of the following may be considered as insider threat(s):

Correct Answer: B